Static task
static1
Behavioral task
behavioral1
Sample
4b268a06d69b663e9fadda54264b8de7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b268a06d69b663e9fadda54264b8de7.exe
Resource
win10v2004-20231215-en
General
-
Target
4b268a06d69b663e9fadda54264b8de7
-
Size
804KB
-
MD5
4b268a06d69b663e9fadda54264b8de7
-
SHA1
9f30bae2d84a675d4ceb0286d98bcf2ca30b500c
-
SHA256
e8fd795b2b916be4b5e52b6d5f384d12b09eb2d56ed9400f8e4995a87f5864e0
-
SHA512
0e95b0ded677dd26ce6c596a9f1ae91f0f1038a27edd01970c92d8ae8b3d2cabf7b8814c0127c64e921fb7b87193f13a361c4b81bc7b6cc145661f45cc5d1260
-
SSDEEP
24576:hY7rPY0NR6bVT8P5QwarmiC6XUQ4ATTrg6w355m:CrPY0NR6ZTG6rmipUQ4ATTrg6wJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b268a06d69b663e9fadda54264b8de7
Files
-
4b268a06d69b663e9fadda54264b8de7.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 672KB - Virtual size: 671KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 50KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rlp Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE